Skip to content

Request a quote, an information or just say hi.
Whatever your reason, just fill out this contact form.
We'd love to hear from you.

    To know and exercise your rights, including withdrawal of your consent to the use of the data collected by this form, please consult our privacy policy.

    You increase in size through international growth and acquisition and needed to ensure you had a handle on the potential cyber risks to your data, your business. THIMPL strategy designed an innovative methodology based around the client’s information security policy. It covered a broad scope of information security principles, processes and practices. The methodology assessed the maturity of every control within scope and identified any weaknesses or vulnerabilities. THIMPL strategy teams were comprised of individuals with broad expertise, ensuring suitable cyber review of both associated business processes and technical controls. The quality of output, added value and insight provided has allowed the client to understand the state of cyber security across its organization, and is now directly helping to shape the future of cyber security.

     

    THIMPL strategy’s objectives :
    EARN YOUR TRUST / UNDERSTAND YOUR BUSINESS / RIGHT TEAM / VALUE ADDED / PRIVACY WORKING

    FIRST – Understanding your context to assess Cyber threat
    Cyber security comprises potential threats not just to areas such as data and systems in Government and businesses, but also to critical infrastructure (which includes: communications, emergency services, energy, finance, food, government and public services, health, transport and water).
    SECOND – Conducting a Cyber risk assessment
    Run a risk cartography, perform business impact assessments and create current and target Cyber Profile.
    THIRD – Meet the objective
    Determine, analyse, and prioritise gaps. Identify resources and department(s) to apply recommendations, identify areas of potential cooperation with external parties.
    FOURTH – Knowledge transfer
    Recommend next steps and ensure an effective knowledge transfer on teams.

    Back To Top